Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Home Topics Titles Quotes Blog Featured Help
Andre C. M. Marien
Leuven, Belgium

André Mariën graduated in 1979 from K.U. Leuven as a civil engineer in computer science.¿He obtained a PhD in computer science in 1993. Recently, he added a master’s degree in enterprise architecture. He has combined a full-time career in industry with a part-time career in academics for the last 30 years.

His industrial experience includes medical informatics, compilers, artificial intelligence, networks, Internet applications, and security. The latter has been his primary focus for the last 15 years. He has consulted across Europe, the US, and the Far East, and has spoken on a wide variety of topics related to security in the US and Europe. He has been a teaching assistant for courses on operating systems and high-level and machine-level programming languages, and for the past 10 years has taught a course on Internet infrastructure security for master’s students at K.U. Leuven.

He is fascinated by security, as it allows one to integrate knowledge from very different disciplines and specializations.¿Risk management benefits from business and managerial thinking. Vulnerability research, biometric authentication, cryptography, and forensics are technically challenging. Security in development is technically, organizationally, and economically driven. Security architecture requires knowledge of many domains and requires a jack-of-all-trades to effectively communicate with all stakeholders.

He enjoys being a reviewer for Computing Reviews, as it provides a perfect excuse to spend time on the latest research, and to explain to others in the field which papers and books one should read.


 The art of immutable architecture
Perry M.,  Apress, New York, NY, 2020. 444 pp. Type: Book (978-1-484259-54-2)

Here is a crazy idea: imagine an information technology (IT) solution where the only persistent memory is write-once, read-many (WORM), or a database without update and delete commands. This book claims such immutable data stores form the basis of...


Information technology for peace and security: IT applications and infrastructures in conflicts, crises, war, and peace
Reuter C.,  Springer International Publishing, New York, NY, 2019. 448 pp. Type: Book (978-3-658256-51-7)

A book with this title might seem to be only marginally relevant for corporate security personnel who are not fighting wars or keeping peace. However, in a typical contextual security analysis, you will find terms like “state actors” a...


Beginning Perl programming: from novice to professional
Rothwell W.,  Apress, New York, NY, 2019. 224 pp. Type: Book (978-1-484250-54-9), Reviews: (1 of 2)

Beginning Perl programming covers the basics of Perl: its origin, scalar variables, array variables, associative array variables, flow control, conditional expressions, basic input/output (I/O), advanced I/O, pattern matching, its utilities...


Systematically understanding the cyber attack business: a survey
Huang K., Siegel M., Madnick S.  ACM Computing Surveys 51(4): 1-36, 2018. Type: Article

Cybercrime is a lucrative business with a very positive return on investment. To combat the cybercrime business, it helps to understand how it operates. The authors use the value chain analysis method to find the 24 key activities or processes tha...


Coming of age: a longitudinal study of TLS deployment
Kotzias P., Razaghpanah A., Amann J., Paterson K., Vallina-Rodriguez N., Caballero J.  IMC 2018 (Proceedings of the 2018 Internet Measurement Conference, Boston, MA,  Oct 31-Nov 2, 2018) 415-428, 2018. Type: Proceedings

The paper presents a longitudinal study of secure sockets layer/transport layer security (SSL/TLS) deployment. The datasets span periods from early 2012 and mid-2015 until now, and contain the TLS parameters used for negotiations as well as those ...


Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2022 ThinkLoud, Inc.
Terms of Use
| Privacy Policy